The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of Trojans targeting Android devices. They can be distributed under the guise of installers for legitimate applications. These malicious programs are, in fact, bots that receive commands from the remote server. They can send SMS messages to premium numbers and are similar in this way to Android.SmsSend Trojans. However, they send short messages only upon receiving a command. Depending on the command, Android.SmsBot can perform other actions, for example, upload to the server the information regarding the infected computer, remove any installed application, display various notifications, etc.
Android.SmsBot.378
Android.SmsBot.379
Android.SmsBot.380
Android.SmsBot.381
Android.SmsBot.382
Android.SmsBot.383
Android.SmsBot.384
Android.SmsBot.385
Android.SmsBot.386
Android.SmsBot.387
Android.SmsBot.388
Android.SmsBot.389
Android.SmsBot.398
Android.SmsBot.399
Android.SmsBot.400
Android.SmsBot.403
Android.SmsBot.404
Android.SmsBot.405
Android.SmsBot.406
Android.SmsBot.409
Android.SmsBot.412
Android.SmsBot.413
Android.SmsBot.414
Android.SmsBot.415
Android.SmsBot.416
Android.SmsBot.425
Android.SmsBot.428
Android.SmsBot.429
Android.SmsBot.430
Android.SmsBot.434
Android.SmsBot.459.origin
Android.SmsBot.472.origin
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.